Known Vulnerabilities in Trusted Firmware-A